From: Dietmar Maurer <dietmar@proxmox.com>
To: Proxmox Backup Server development discussion
<pbs-devel@lists.proxmox.com>,
Wolfgang Bumiller <w.bumiller@proxmox.com>
Subject: Re: [pbs-devel] [REBASED backup 03/14] add node config
Date: Fri, 30 Apr 2021 08:26:33 +0200 [thread overview]
Message-ID: <e16740e3-047f-4f81-3043-53dbdd9c7e01@proxmox.com> (raw)
In-Reply-To: <20210429131322.24319-4-w.bumiller@proxmox.com>
Again, please can you include the suggested changes?
On 4/29/21 3:13 PM, Wolfgang Bumiller wrote:
> Signed-off-by: Wolfgang Bumiller <w.bumiller@proxmox.com>
> ---
> src/config.rs | 1 +
> src/config/node.rs | 190 +++++++++++++++++++++++++++++++++++++++++++++
> 2 files changed, 191 insertions(+)
> create mode 100644 src/config/node.rs
>
> diff --git a/src/config.rs b/src/config.rs
> index 83ea0461..94b7fb6c 100644
> --- a/src/config.rs
> +++ b/src/config.rs
> @@ -20,6 +20,7 @@ pub mod acme;
> pub mod cached_user_info;
> pub mod datastore;
> pub mod network;
> +pub mod node;
> pub mod remote;
> pub mod sync;
> pub mod tfa;
> diff --git a/src/config/node.rs b/src/config/node.rs
> new file mode 100644
> index 00000000..b6abeef3
> --- /dev/null
> +++ b/src/config/node.rs
> @@ -0,0 +1,190 @@
> +use std::fs::File;
> +use std::time::Duration;
> +
> +use anyhow::{format_err, Error};
> +use nix::sys::stat::Mode;
> +use serde::{Deserialize, Serialize};
> +
> +use proxmox::api::api;
> +use proxmox::api::schema::{self, Updater};
> +use proxmox::tools::fs::{replace_file, CreateOptions};
> +
> +use crate::acme::AcmeClient;
> +use crate::config::acme::{AccountName, AcmeDomain};
> +
> +const CONF_FILE: &str = configdir!("/node.cfg");
> +const LOCK_FILE: &str = configdir!("/.node.cfg.lock");
> +const LOCK_TIMEOUT: Duration = Duration::from_secs(5);
> +
> +pub fn read_lock() -> Result<File, Error> {
> + proxmox::tools::fs::open_file_locked(LOCK_FILE, LOCK_TIMEOUT, false)
> +}
> +
> +pub fn write_lock() -> Result<File, Error> {
> + proxmox::tools::fs::open_file_locked(LOCK_FILE, LOCK_TIMEOUT, true)
> +}
> +
> +/// Read the Node Config.
> +pub fn config() -> Result<(NodeConfig, [u8; 32]), Error> {
> + let content =
> + proxmox::tools::fs::file_read_optional_string(CONF_FILE)?.unwrap_or_else(|| "".to_string());
> +
> + let digest = openssl::sha::sha256(content.as_bytes());
> + let data: NodeConfig = crate::tools::config::from_str(&content, &NodeConfig::API_SCHEMA)?;
> +
> + Ok((data, digest))
> +}
> +
> +/// Write the Node Config, requires the write lock to be held.
> +pub fn save_config(config: &NodeConfig) -> Result<(), Error> {
> + let raw = crate::tools::config::to_bytes(config, &NodeConfig::API_SCHEMA)?;
> +
> + let backup_user = crate::backup::backup_user()?;
> + let options = CreateOptions::new()
> + .perm(Mode::from_bits_truncate(0o0640))
> + .owner(nix::unistd::ROOT)
> + .group(backup_user.gid);
> +
> + replace_file(CONF_FILE, &raw, options)
> +}
> +
> +#[api(
> + properties: {
> + account: { type: AccountName },
> + }
> +)]
> +#[derive(Deserialize, Serialize)]
> +/// The ACME configuration.
> +///
> +/// Currently only contains the name of the account use.
> +pub struct AcmeConfig {
> + /// Account to use to acquire ACME certificates.
> + account: AccountName,
> +}
> +
> +#[api(
> + properties: {
> + acme: {
> + optional: true,
> + type: String,
> + format: &schema::ApiStringFormat::PropertyString(&AcmeConfig::API_SCHEMA),
> + },
> + acmedomain0: {
> + type: String,
> + optional: true,
> + format: &schema::ApiStringFormat::PropertyString(&AcmeDomain::API_SCHEMA),
> + },
> + acmedomain1: {
> + type: String,
> + optional: true,
> + format: &schema::ApiStringFormat::PropertyString(&AcmeDomain::API_SCHEMA),
> + },
> + acmedomain2: {
> + type: String,
> + optional: true,
> + format: &schema::ApiStringFormat::PropertyString(&AcmeDomain::API_SCHEMA),
> + },
> + acmedomain3: {
> + type: String,
> + optional: true,
> + format: &schema::ApiStringFormat::PropertyString(&AcmeDomain::API_SCHEMA),
> + },
> + acmedomain4: {
> + type: String,
> + optional: true,
> + format: &schema::ApiStringFormat::PropertyString(&AcmeDomain::API_SCHEMA),
> + },
> + },
> +)]
> +#[derive(Deserialize, Serialize, Updater)]
> +/// Node specific configuration.
> +pub struct NodeConfig {
> + /// The acme account to use on this node.
> + #[serde(skip_serializing_if = "Updater::is_empty")]
> + acme: Option<String>,
> +
> + /// ACME domain to get a certificate for for this node.
> + #[serde(skip_serializing_if = "Updater::is_empty")]
> + acmedomain0: Option<String>,
> +
> + /// ACME domain to get a certificate for for this node.
> + #[serde(skip_serializing_if = "Updater::is_empty")]
> + acmedomain1: Option<String>,
> +
> + /// ACME domain to get a certificate for for this node.
> + #[serde(skip_serializing_if = "Updater::is_empty")]
> + acmedomain2: Option<String>,
> +
> + /// ACME domain to get a certificate for for this node.
> + #[serde(skip_serializing_if = "Updater::is_empty")]
> + acmedomain3: Option<String>,
> +
> + /// ACME domain to get a certificate for for this node.
> + #[serde(skip_serializing_if = "Updater::is_empty")]
> + acmedomain4: Option<String>,
> +}
> +
> +impl NodeConfig {
> + pub fn acme_config(&self) -> Option<Result<AcmeConfig, Error>> {
> + self.acme.as_deref().map(|config| -> Result<_, Error> {
> + Ok(crate::tools::config::from_property_string(
> + config,
> + &AcmeConfig::API_SCHEMA,
> + )?)
> + })
> + }
> +
> + pub async fn acme_client(&self) -> Result<AcmeClient, Error> {
> + AcmeClient::load(
> + &self
> + .acme_config()
> + .ok_or_else(|| format_err!("no acme client configured"))??
> + .account,
> + )
> + .await
> + }
> +
> + pub fn acme_domains(&self) -> AcmeDomainIter {
> + AcmeDomainIter::new(self)
> + }
> +}
> +
> +pub struct AcmeDomainIter<'a> {
> + config: &'a NodeConfig,
> + index: usize,
> +}
> +
> +impl<'a> AcmeDomainIter<'a> {
> + fn new(config: &'a NodeConfig) -> Self {
> + Self { config, index: 0 }
> + }
> +}
> +
> +impl<'a> Iterator for AcmeDomainIter<'a> {
> + type Item = Result<AcmeDomain, Error>;
> +
> + fn next(&mut self) -> Option<Self::Item> {
> + let domain = loop {
> + let index = self.index;
> + self.index += 1;
> +
> + let domain = match index {
> + 0 => self.config.acmedomain0.as_deref(),
> + 1 => self.config.acmedomain1.as_deref(),
> + 2 => self.config.acmedomain2.as_deref(),
> + 3 => self.config.acmedomain3.as_deref(),
> + 4 => self.config.acmedomain4.as_deref(),
> + _ => return None,
> + };
> +
> + if let Some(domain) = domain {
> + break domain;
> + }
> + };
> +
> + Some(crate::tools::config::from_property_string(
> + domain,
> + &AcmeDomain::API_SCHEMA,
> + ))
> + }
> +}
next prev parent reply other threads:[~2021-04-30 6:27 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-04-29 13:13 [pbs-devel] [REBASED backup 00/14] rebased and reordered remaining acme patches Wolfgang Bumiller
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 01/14] add dns alias schema Wolfgang Bumiller
2021-04-30 6:11 ` [pbs-devel] applied: " Dietmar Maurer
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 02/14] add acme config and client Wolfgang Bumiller
2021-04-30 6:16 ` Dietmar Maurer
2021-04-30 7:25 ` Wolfgang Bumiller
2021-04-30 6:20 ` Dietmar Maurer
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 03/14] add node config Wolfgang Bumiller
2021-04-30 6:26 ` Dietmar Maurer [this message]
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 04/14] add config/acme api path Wolfgang Bumiller
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 05/14] add node/{node}/certificates api call Wolfgang Bumiller
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 06/14] add node/{node}/config api path Wolfgang Bumiller
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 07/14] add acme commands to proxmox-backup-manager Wolfgang Bumiller
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 08/14] implement standalone acme validation Wolfgang Bumiller
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 09/14] ui: add certificate & acme view Wolfgang Bumiller
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 10/14] daily-update: check acme certificates Wolfgang Bumiller
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 11/14] acme: create directories as needed Wolfgang Bumiller
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 12/14] acme: pipe plugin output to task log Wolfgang Bumiller
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 13/14] api: acme: make account name optional in register call Wolfgang Bumiller
2021-04-29 13:13 ` [pbs-devel] [REBASED backup 14/14] validate node config before writing Wolfgang Bumiller
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=e16740e3-047f-4f81-3043-53dbdd9c7e01@proxmox.com \
--to=dietmar@proxmox.com \
--cc=pbs-devel@lists.proxmox.com \
--cc=w.bumiller@proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox